Have you ever noticed that your email client application has both spam and junk mail folders? What exactly is the difference and when should you use each? The difference largely comes down to permissions. Spam is unsolicited email, aka, mail that you haven’t asked for...

A weak password is still one of the most common ways hackers break in. Thanks to sophisticated brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess...

Office 365 and Google Apps are two perfect mainstream examples of the cloud computing trend for small businesses; for an inexpensive monthly fee, you can get full access to and use of Office applications that used to cost a few hundred dollars to purchase. And, since...